The CSI Case Management System is about to be released. The courses will be updated to match the update.
N |
|---|
NAT (Network Address Translation)A networking method where multiple internal devices share a single external IP address. NAT complicates attribution because provider logs may identify only the gateway; internal router logs, device artifacts, or additional network evidence may be required. | |
Native ExportData produced directly by the source application or provider (for example, a platform’s account download or chat export). Native exports can carry useful identifiers and structure that support authenticity, but investigators still document how the export was obtained and preserved. | |
NERC CIP (North American Electric Reliability Corporation Critical Infrastructure Protection)NERC CIP is a set of cybersecurity standards designed to protect the critical infrastructure of North America's bulk electric systems from cyber threats. The standards cover areas such as security management, incident reporting, and disaster recovery for ICS and SCADA systems. | |
NFT (Non‑Fungible Token)A token representing a unique item or right, typically recorded on a blockchain via a token standard. | |
NIST Cybersecurity Framework (CSF)The NIST Cybersecurity Framework (CSF) provides guidelines, standards, and best practices for managing cybersecurity risks. It is widely used by organizations in various industries, including ICS and IIoT, to enhance their cybersecurity posture and resilience. | |
NIST SP 800-82NIST Special Publication 800-82 provides guidelines for securing Industrial Control Systems (ICS), including SCADA systems, distributed control systems (DCS), and programmable logic controllers (PLCs), addressing the unique cybersecurity needs of these environments. | |
NmapNmap (Network Mapper) is an open source network security tool used for network exploration and security auditing. Its primary purpose is to detect active network connections and services as well as hosts and operating systems that are running on the network. Nmap can be used to perform port scans, run intrusion detection systems, identify system vulnerabilities, and more. It is often used as a tool for security professionals to gain an understanding of their networks or to detect and analyze suspicious activity. For example, an administrator may run a Nmap scan to see what machine addresses, ports, and services are available on the network and afterwards use this information to configure a firewall. For instance, they may block or limit access to ports they do not trust or use to improve the security of their network. Another example is using Nmap to detect hosts on the network. This can be helpful for identifying potential intruders or for tracking down machines that are not visible to the network due to being outside of the allowed range. In addition, Nmap can be used to look for open ports and services running on those ports so the security team can investigate further what is running and if any potential threats are present. Nmap can also be used for vulnerability scanning to detect potential security issues. For example, a scan can be used to determine if services and services versions that are vulnerable to known threats are running on the network. This allows the security team to take appropriate and timely action to fix or mitigate the issue. Finally, Nmap can be used to run operating system fingerprinting to detect what operating system is running on a given machine. This can help identify possible malicious activity or detect compromised machines on the network. | |
NodeA computer running blockchain software that relays and/or validates transactions and blocks. | |
Non-RepudiationThe property that prevents a party from credibly denying an action, such as signing a document or sending a message. Digital signatures combined with key control, secure timestamps, and audit logs are commonly used to support non-repudiation. | |